Skip to content

Instantly share code, notes, and snippets.

View iflowfor8hours's full-sized avatar
💭
on the lookout.

mxs iflowfor8hours

💭
on the lookout.
View GitHub Profile
Over the last week or so the community has been a bit worried about the security of Tor. The reason for this is Operation Onymous that in a concentrated crackdown took down a number of illegal or problematic dark web sites, all of which were hidden behind Tor Hidden Services. In this article I want to quickly talk about whether Tor is broken or not.
First the facts. As far as we know, only 17 persons have been arrested or indicted in this action. The amount of Dark sites taken down were first reported as around 400, but later we have seen that it is more in the range of 27 actual web sites that were taken control of - but many more hidden service addresses, since these sites all presumably ran a large number of hidden services.
The big question is whether it is possible that law enforcement agencies have used a weakness in Tor to find the real location of these servers and taking them down. This is of course not at all impossible. There are some known weaknesses that could have been used for this, althoug
A recent thread asked about book writing and as part of my response to that I decided to link to some general advice about book writing that I wrote down a while ago. However I couldn't find it on jive (maybe it was on wazokazi?) so I thought I'd copy it here for future reference.
I’ve had a few conversations recently with people interested in writing a book and looking to find a publisher. So I thought I should write some of this down.
There are lots of different ways this can happen, and there are variations between due to different kinds of books and different publishers. So don’t take this as absolute advice, just my experience.
First off, remember that writing a book is hard. Everyone I know who’s written one were surprised by how hard it was, even though everyone they knew told them it would be hard. It’s a lot of work and very consuming. In addition it doesn’t pay well. Although you can be lucky and write a best seller (as has happened to me) it’s a rare event. At a rough guess you’ll get somethi
@iflowfor8hours
iflowfor8hours / peep this
Created October 31, 2014 10:40
chef offer
Hi Matt,
Hope you are doing great. I am an Acquisition Editor at Packt Publishing(www.packtpub.com). We are planning to develop a book on Chef titled Troubleshooting Chef and I am looking for authors on this title. It will be a 150-page book and it will be targeted at competent Chef administrators.
About the book:
• The main aim of this book is to make Chef reliant, performant, and scalable by understanding error messages and troubleshooting key issues. This becomes increasingly important as Chef Server at times manage 10,000+ nodes.
• Some of the suggestive content this book will cover would be:
o Using Chef logs as key troubleshooting resources
o Debugging recipes
o Expanding Puppet infrastructure- troubleshooting key considerations
@iflowfor8hours
iflowfor8hours / keybase.md
Created October 1, 2014 10:35
keybase.md

Keybase proof

I hereby claim:

  • I am iflowfor8hours on github.
  • I am iflowfor8hours (https://keybase.io/iflowfor8hours) on keybase.
  • I have a public key whose fingerprint is F24B 797B AF86 E441 8F35 CAD0 2C2A 8D01 C783 7460

To claim this, I am signing this object:

from invoke import run, task, Collection
import os
import shutil
import tarfile
@task
def install_dependencies():
run("source .looksee_venv/bin/activate")
run("pip install -r webapp/requirements.txt")
|-- ansible_hosts
|-- group_vars
| `-- all.yml
|-- README.md
|-- requirements.txt
|-- roles
| |-- bennojoy.mysql
| | |-- defaults
| | | `-- main.yml
| | |-- handlers
@iflowfor8hours
iflowfor8hours / virtualization_presentation
Created November 4, 2013 09:37
Notes for the virtualization presentation at http://slid.es/urbanskims/vmprimer
Full Virtualization
* All devices are emulated
* No resources or devices are shared with host machine unless explicitly configured to work this way (usb, network, etc)
* Like having an entirely separate machine inside your own
* Can be resource intensive as everything must be emulated, and a separate copy of every file must be maintained.
* Resources are dedicated to running things that are already running on your box.
* Can be snapshotted and restored easily with most common virt platforms.
* must emulate everything, so slow to start
* Other operating systems supported
@iflowfor8hours
iflowfor8hours / gist:1756902
Created February 7, 2012 03:11
Scaffolding for review site black tshirts
user
username
password
email
uid
@reviews
tshirt